Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for generating modular security delegates for applications

a security delegation and application technology, applied in the field of authentication of user credentials, can solve problems such as inacceptable risk and the inability to build in multiple authentication and authorization levels

Active Publication Date: 2012-09-06
RED HAT
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in many applications, building in multiple authentication and authorization levels can pose a problem, if, for example, different authentication mechanisms and / or authorization mechanisms are used.
For example, if the application is capable of accepting multiple forms of authentication, this can create an unacceptable level of risk since it could expose, for example, internal corporate authentication mechanisms to brute-force attacks from, for example, the internet, and this could also cause ambiguous credentials that could be valid for one form of authentication but not the other.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for generating modular security delegates for applications
  • Systems and methods for generating modular security delegates for applications
  • Systems and methods for generating modular security delegates for applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010]For simplicity and illustrative purposes, the principles of the present teachings are described by referring mainly to exemplary embodiments thereof. However, one of ordinary skill in the art would readily recognize that the same principles are equally applicable to, and can be implemented in, all types of information and systems, and that any such variations do not depart from the true spirit and scope of the present teachings. Moreover, in the following detailed description, references are made to the accompanying figures, which illustrate specific embodiments. Electrical, mechanical, logical and structural changes may be made to the embodiments without departing from the spirit and scope of the present teachings. The following detailed description is, therefore, not to be taken in a limiting sense and the scope of the present teachings is defined by the appended claims and their equivalents.

[0011]Embodiments of the present teachings relate to systems and methods for generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism.

Description

FIELD[0001]This invention relates generally to authenticating user credentials using a separate modular security delegate for applications.DESCRIPTION OF THE RELATED ART[0002]There are many applications that require access by multiple types of users. For example, administrators who can have high levels of access, external users who can have lower levels of access, employees of a company that is providing the application who can have middle levels of access, etc. For each type of user / access, the applications can provide different functionality, which can be protected by requiring a specific level of security for each user type.[0003]However, in many applications, building in multiple authentication and authorization levels can pose a problem, if, for example, different authentication mechanisms and / or authorization mechanisms are used. As used herein, authentication and authentication mechanisms can be directed to determining if the user is the actual user identified, whereas author...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F7/04
CPCH04L63/08H04W12/06H04W12/069
Inventor WOOD, THOMAS ALEXANDERECKERSBERG, II, JOHN J.RADEZ, DANIEL
Owner RED HAT